bugs   13873

« earlier    

Gas Mask sets ACL on /etc/hosts; breaks other tools like vagrant · Issue #129 · 2ndalpha/gasmask
By using Gas Mask, an ACL is set on /etc/hosts for the current user that started Gas Mask. This causes nobody else to be able to write to /etc/hosts, effectively locking out any/everything else. People using vagrant and plugins to automa...
web-dev  bugs 
yesterday by edmadrid
Twitter
More bugs = more secure? Adding decoy vulnerability to software can obfuscate real vulnerabilities and frustr…
bugs  from twitter_favs
3 days ago by mcaloney
[1808.00659] Chaff Bugs: Deterring Attackers by Making Software Buggier
Sophisticated attackers find bugs in software, evaluate their exploitability, and then create and launch exploits for bugs found to be exploitable. Most efforts to secure software attempt either to eliminate bugs or to add mitigations that make exploitation more difficult. In this paper, we introduce a new defensive technique called chaff bugs, which instead target the bug discovery and exploit creation stages of this process. Rather than eliminating bugs, we instead add large numbers of bugs that are provably (but not obviously) non-exploitable. Attackers who attempt to find and exploit bugs in software will, with high probability, find an intentionally placed non-exploitable bug and waste precious resources in trying to build a working exploit. We develop two strategies for ensuring non-exploitability and use them to automatically add thousands of non-exploitable bugs to real-world software such as nginx and libFLAC; we show that the functionality of the software is not harmed and demonstrate that our bugs look exploitable to current triage tools. We believe that chaff bugs can serve as an effective deterrent against both human attackers and automated Cyber Reasoning Systems (CRSes).
chaff  bugs  security  buggier 
7 days ago by cstanhope
Chainspotting! Building Exploit Chains with Logic Bugs
Le gagnant du pwnie 2018 pour le meilleur Client-side bug : une chaîne d'exploitation complète sur Android sans une seule corruption mémoire !

La chaîne repose entièrement sur des bugs logiques (drop de fichiers maitrisés dans la sdcard, path directory traversal, etc.) et sur le mécanisme d'intent (sortes de protocoles handlers au stéroïdes) pour atteindre les vulnérabilités.

Il parle également rapidement de comment ils automatise la recherche de chemins vulnérables (x-refs, etc.) dans un binaire Android.
android  exploit  logic  bugs 
9 days ago by lucasg
Chaff Bugs: Deterring Attackers by Making Software Buggier
Sophisticated attackers find bugs in software, evaluate their exploitability, and then create and launch exploits for bugs found to be exploitable. Most efforts to secure software attempt either to eliminate bugs or to add mitigations that make exploitation more difficult. In this paper, we introduce a new defensive technique called chaff bugs, which instead target the bug discovery and exploit creation stages of this process. Rather than eliminating bugs, we instead add large numbers of bugs that are provably (but not obviously) non-exploitable. Attackers who attempt to find and exploit bugs in software will, with high probability, find an intentionally placed non-exploitable bug and waste precious resources in trying to build a working exploit. We develop two strategies for ensuring non-exploitability and use them to automatically add thousands of non-exploitable bugs to real-world software such as nginx and libFLAC; we show that the functionality of the software is not harmed and demonstrate that our bugs look exploitable to current triage tools. We believe that chaff bugs can serve as an effective deterrent against both human attackers and automated Cyber Reasoning Systems (CRSes).
code  security  infosec  bugs  obscurity 
11 days ago by tarakc02
Y2k - The Idiot's Guide
What happened, why it was a real problem and how it was mitigated.
software  bugs  Brexit 
12 days ago by alastc

« earlier